How To Steal An Election


“Of course the election will not be rigged, what does that even mean?” The minute President Obama uttered those words, I already knew answer, and he knew full well what it meant, for he was involved in it twice.

How do you rig / steal an election?

It’s easier than you think:

First you obtain a voter registration list. You can obtain them for any State; they are a matter of public record. Just do an Internet search: how to get voter registration lists.

Next you get an organization to work the voter registration list. These ‘volunteers’ (paid workers) canvas their assigned areas. The canvassers determine who is an active voter, and who hasn’t voted for some time. Then you make sure these people vote.

Do they drive them to the polls? Only a few times for photo-op purposes, the rest of the time they vote the way the campaign worker wants them too. If the voter supports their candidate, the campaign worker gladly helps them fill out the absentee ballot and take it to the ballot box for them. Nothing wrong with that then it gets a little dishonest.

If the voter is not going to vote, then the campaign worker votes for them, using their name and casting their vote by proxy (unbeknown st to the voter).

If the ‘not-recently-active‘ voters are deceased, or moved, but their name is still on the list, then you send in an absentee ballot in their behalf, voting for their candidate of course.

Is absentee ballot voting a big deal? Absolutely, in California absentee voting counts for as much as 13% of the total. The longer the window for absentee, or early voting is, the greater the chance to rig the outcome.

California Primary Slowed By Vote-By Mail, Absentee Ballot Count

Do an Internet search with terms: absentee voting Nov 2008

You will even see where Obama’s Grandmother, who was deceased by the time the election took place, had her ballot counted.

Then there were many instances where military personnel had their ballots effectively delayed in 2008 in which it cannot be argued most of those votes would have gone for McCain.

So where does one find such an organization? Luckily, Obama and the Progressives had one already in operation. ACORN (Association of Community Organizations for Reform Now).

Since Obama was himself a community organizer, it was a perfect fit, in more ways than one.

Not only was ACORN a tax free org. They also received funding from the government.

$53 Mil since 1994 until their demise in 2010.

Let me be clear- Obama didn’t organize the rigged election in 2008, he wasn’t that smart or wealthy enough to pull it off, Obama was just the ‘front man,’ but his backers were. Who were the Obama backers? The Kennedy family, Teddy Kennedy to be precise, and of course George Soros, were the Progressive Obama backers.

After the 2008 election was over, ACORN was thrown on the Progressive scrap heap, filing for bankruptcy in Nov 2010. That’s the Progressive way; they use you, and then throw you away like you would so much trash.

Secondly, simply have people vote more than once in person. Easy to do with inaccurate voter registration lists and no photo ID required, simply have ‘volunteers’ to vote in more than on precinct. It happened in 2008 and again in 2012.

Here is just one example (of perhaps thousands or tens of thousands of times) it happened.

Cincinnati poll worker indicted for voting for Obama six times

In fact voter fraud proved to be rampant in so many states; the states were forced to institute Voter ID legislation to curb the practice.

2012 Would prove more difficult with the dismantling of ACORN and public suspicion on the rise. The paid workers would still continue to work the absentee and mail in ballots, but the race was a little tighter this time and the loss of the Kennedy backing was difficult to overcome. They needed help.

The Progressives would turn to their two closest allies (other than government employees) the Unions and the media. They would score a major success against then candidate Mitt Romney with the article Published by the fledgling media outlet Mother Jones.

As you may recall Mother Jones broke the story of Romney’s comments about the 47% (which was true but carefully edited); the undercover video was submitted by a part time waiter/bartender who just couldn’t stand by and let Romney get away with this. His name is Scott Prouty, he was a plant, and would be well taken care of if he did his job and kept his mouth shut until after the election.

He did what he was told, waiting until March of 2013 before going public with the b.s. story. What did he get for his work? Besides a nice check, he lands a cushy job with the United Steel workers Union.

Still think he just happened to be at the Romney fund raiser? That Mr. Obama, is “what that means,” to rig an election and how it’s done.

The outcome of the 2012 Election is history, but the progressives are already hard at work to steal the 2016 election, and payback Hillary for her part in the 2012 election. I’m referring to the Benghazi cover-up. The deal with Hillary was struck for 2016, and an otherwise disaster avoided.

In 2016, the Progressives already have an ACORN replacement, Color Of Change , the organization founded by Obama’s friend and partner in corruption, Van Jones. Van Jones’s first job was to set up shop in potential swing states like North Carolina.

The ties between Color of Change, George Soros, the SEIU (Services Employees International Union) are well documented, even though the main-stream Liberal controlled media will never expose these ties or give them the investigation they deserve.

It would be interesting to know how much Federal funding Color Of Change is receiving. But those financial details will not be available for public scrutiny until after the 2016 election is concluded.

What with many states having recently passed voter ID laws and federal scrutiny on mail-i-ballots, an organization like Color of Change wouldn’t be enough to secure victory, even with the already-in-the-tank for Hillary media. So what to do?

First, bring pressure to bear on the academia community (payback for the Obama 2009 stimulus bill which kept the teacher union retirement systems from bankruptcy). And they caved in like the good little progressives they are.

Here is just a couple of links to confirm the cave in or payback, take your pick.

Link

ColorOfChange’s Rashad Robinson to Deliver 2015 Commencement Address to St. Mary’s College Graduates

 

Need more: type this into Google – color of change supported by colleges – and see for yourself.

Sad isn’t it, the academic community, supposedly the smartest people, have become little more than tools, tools used to steal an election.

Just for good measure, let’s pressure the right judges in the right places to stop the voter ID laws so Color of Change and similar organizations can get back to work.

They succeeded in North Carolina. The 4th U.S. Circuit Court struck down the Voter ID legislation just in time for November. Who were those judges?

“Judge Diana Motz, a Bill Clinton appointee, Judge JamesWynn Jr., a Barack Obama appointee, and Judge Henry Floyd, an Obama appointee.”

In Texas, the same scenario: Voter ID legislation struck down just in time for November, struck down by another Obama appointee, U.S. District Judge Nelva Gonzales Ramos.

Notice how these selected states are either swing-states or have a large delegate count? You think this is coincidence?

Look for more of the same type of timely actions in other swing states like Pennsylvania and Florida.

Ohio already under assault.

That is what stealing an election means and how it is done.

The deck is stacked in the favor of Hillary Clinton, and we may only have one more chance to end this type of vote rigging. 2016.

You must get out and vote against Hillary Clinton.

We are approaching the tipping point; where there will be more government employees and people on government welfare of one form or another, than those who work for a living and aren’t monetary slaves to the government. If we past that point, vote rigging will be a thing of the past, having been replaced by a foregone conclusion.

Then the dream of Progressives will become a reality: the middle class will be gone, leaving only two classes; the ruling class and the slaves to the government

ElectionFraud_v3

 

Thoughts on Hillary’s e-mail Blunder

Working in IT for a living I am all-too-aware of how problematic security can be when it comes to email.

Corporations spend Millions on security to guard against intrusions, but this security has an Achilles heel, email.

Most corporate hacks are the result of compromised email addresses of employees who have high or admin access to sensitive material.

Even if the email hacks are successful on an employee who doesn’t have access to sensitive information, the hacker still has access to the email account itself.

With this access, the hacker can read, write, create, and delete emails in the account. The emails themselves may contain material that is secret or sensitive in content.

Those secretes may be personal, professional, or legal in nature, of they may contain trade secrets, information about upcoming events or even customer contact information.

So even though companies spend Millions annually to protect sensitive information, IT people know security is at the mercy of the individual user.iStock_000017775671XSmall

So when I heard that the secretary of state was running her own private email server outside of government supervision, outside of government run security protocols, I couldn’t believe it. What a careless thing to do.

Yes, many of us have private and corporate email addresses, I have a couple of each, but I use my business email address for business and private email for personal communication. I don’t mix the 2. Using my business email for personal matters is a no-no and most large companies forbid it.

The danger of mixing the two is there are invariably cross links. For example; say I use my business email to contact a friend on a personal matter, it could be anything, maybe an upcoming sporting event I’d like to watch, sharing a joke, or just plain B.S. If my friends email account gets hacked or already has been hacked, then the hacker has my business email address, exposing it to possible attacks.

Suppose my friends email account is hacked; I get an email from the same friend (except the hacker sends it unbeknownst to me), it contains a note or picture, and because I recognize the sender I open it. Unfortunately the email contains malware and now I’m compromised.

If on a small scale, knowing what a risk this represents, imagine the enormous risk posed by a Secretary of State whose is careless with her email account. It may never be known how much information is in the hands of the wrong people.

I further find it incredible that no one in the government put a stop to the practice after day one. It’s not like they didn’t know – or are completely brain dead. When you receive an email from someone the email address is evident. I.E. steve@clueless.com. So you recognize Steve and the email account he is associated with.

You would think the alarm bells would go off when someone in the State Department or any government department received an email from hillary@clintonemail.com!

Even if they didn’t pay attention to the senders address, any replies they sent would be obvious it was not a government server they were sending it to.

workamajig-security-failBut the use of the private email account was allowed to continue. Everyone who sent to or received from clintonemail.com knew this was against the rules. It was a careless risk, with national security implications, and no one cared.

How could such a blunder be allowed at the highest levels of our government?

The defense presented by Hillary was so lame it was laughable.

“The emails weren’t flagged top secret when I received them.” What?

So your defense is because they didn’t have a red flag in the subject line that said top secret, it relieves you of any responsibility?

You mean you couldn’t determine from the content, who it was from, or both, the information was top secret? So you defend incompetence with ignorance? Really? That’s your defense? And you are Secretary of State?

If I send a letter to my attorney, it is de facto subject to attorney client privilege, so wouldn’t it be safe to assume if you as Secretary of State received an email from the Chairman of the Joint Chiefs of Staff or an Ambassador from another country that it would be at least secret, if not top secret? Of course you would.

You and I send and receive private emails all the time that contain content that is not for public consumption, and we have enough sense to use discretion on what we can share and with whom, the contents of the email. Evidently Hillary Clinton doesn’t possess even that basic of discretion.

Defending incompetence with ignorance is an unbelievable excuse. Especially when National Security issues, or the lives of men and women serving to protect us are potentially put at risk.

We are not talking about a teenager on their first job being careless with an email account we are talking about the Secretary of State, who was previously a Senator, and before that First Lady of the U.S.

The emails exposed were even more damning to their defense. One email set revealed Hillary Clinton told her daughter Chelsea the attack on the Benghazi consulate was a terrorist attack while she told the American people the attacks were due to a YouTube Video.

Incompetence defended by ignorance, defended by deception becomes laughable when you expect others to believe it.

“Ignorance of the law excuses no man.” Unless you’re Hillary Clinton.